what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2005-05-07

TOR Virtual Network Tunneling Tool 0.0.9.9
Posted May 7, 2005
Authored by Roger Dingledine | Site tor.eff.org

Tor version 0.0.9.9 is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: various bugfixes.
tags | tool, remote, local, peer2peer
SHA-256 | 713359cf4b620afe1f75e84150e2c49ebc76f35dedc8af3639866b5a6747d536
codebug-9.txt
Posted May 7, 2005
Authored by Alberto Trivero | Site codebug.org

Codebug Labs Advisory 09 - myBloggie 2.1.1 multiple vulnerabilities. Full path disclosure, Cross-Site Scripting, content deletion, and SQL injection vulnerabilities exist in myBloggie 2.1.1.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | f7f7644eba42b3961a50a761d17b98dae395eb1f1dd97d656f8504adfac6d9e5
google_adsense_css.txt
Posted May 7, 2005
Authored by Lostmon | Site lostmon.blogspot.com

Google adsense is vulnerable to remote cross-site scripting attacks. This is due to several name and message fields not being properly validated.

tags | advisory, remote, xss
SHA-256 | 1d9f0a3ba37186bf2960e4947afdb38a5e9e8dd89100de61267b3f9ac65f6db1
ICMP3Code4.c
Posted May 7, 2005
Authored by Norwegian

Simple tool that transmits ICMP type 3 code 4 messages to a given destination, sometimes resulting in the connection being terminated or severely hampered. Reported to work against Linux boxes.

tags | advisory
systems | linux
SHA-256 | 327269e6429f86a37a10156ec5f7a14d6f138ea0bc11b2c79d9124fdd7136cbe
ActiveFax.txt
Posted May 7, 2005
Authored by cyqex

ActiveFax, a network-enabled fax transmission/reception system, contains a FTP server which can be used to perform FTP bounce attacks (which are useful for conducting nmap portscans in an anonymous way, among other things).

tags | advisory
SHA-256 | e4d4d31f65ce645a4e34763f56c51382066db599977952385ad53de79902fa48
dc_phpcoin.txt
Posted May 7, 2005
Authored by Diabolic Crab | Site hackerscenter.com

phpCoin versions 1.2.2 and lower contain multiple SQL injection vulnerabilities. Example exploit URL included in advisory.

tags | exploit, vulnerability, sql injection
SHA-256 | 601b133e8301c87eb6eb9fdba49d5cdb091bf6e55921dd461f447ae6272cb8f7
tripp_test.1c.tar.gz
Posted May 7, 2005
Authored by poplix | Site tripp.dynalias.org

TRIPP is a utility to rewrite outgoing IP packets. Since it can rewrite both header and payload data, it combines functionality found in iptables as well as netsed. This can be useful for performing replay attacks, altering your own OS fingerprint, or for bypassing remote firewalls.

tags | remote
systems | unix
SHA-256 | dd20c3a4d3957262197fe88667340ecfabf33650727217079e673d6d2796ef11
phpcart_price_manipulation.txt
Posted May 7, 2005
Authored by Lostmon | Site lostmon.blogspot.com

PHPcart allows for user-manipulation of the price's of items in the shopping cart.

tags | advisory
SHA-256 | 2e0e2cbc123be6aaf5914c8b302c535b34de75fd2bf0edc6cc0b96e3075b00d7
dc_metacart_eshop8_sqlinj.txt
Posted May 7, 2005
Authored by Diabolic Crab | Site hackerscenter.com

Metacart e-Shop V-8 contains multiple SQL injection vulnerabilities. Advisory contains example exploit URLs.

tags | advisory, vulnerability, sql injection
SHA-256 | 9f5aa360ae5554856b5d462c2a9e439d199ae15eb11293343101e44e186f6a82
dc_MetaCart2PayPal_sqlinj.txt
Posted May 7, 2005
Authored by Diabolic Crab | Site hackerscenter.com

Metacart2 for PayPal contains multiple SQL injection vulnerabilities. Example exploit URLs included in advisory.

tags | advisory, vulnerability, sql injection
SHA-256 | 27e51a9ee256de129e003e64d058376aba570d399ba96db38f27e400c3e08c68
dc_MetaCart2SQL_sqlinj.txt
Posted May 7, 2005
Authored by Diabolic Crab | Site hackerscenter.com

MetaCart2 for SQL Server, Special Edition U.K. contains multiple SQL injection vulnerabilities. Example exploit URL included in advisory.

tags | advisory, vulnerability, sql injection
SHA-256 | bf27a85a45c5105011343f17098e773a5519727cebe0ae2776fee8fe16544a19
dc_metacart_sqling.txt
Posted May 7, 2005
Authored by Diabolic Crab | Site hackerscenter.com

Multiple SQL injection vulnerabilities in metacart2 for payflow. Example exploit URL included in advisory.

tags | exploit, vulnerability, sql injection
SHA-256 | 91a62b15583088eafdf55e57ac53a4580189ef41a7ca845c6184ff7996ea6447
dc_metabid_sqlinj.txt
Posted May 7, 2005
Authored by Diabolic Crab | Site hackerscenter.com

Metabid contains multiple SQL injection vulnerabilities. Username / Password verification can be bypassed via SQL injection, and more issues exist. Advisory contains example exploit URL.

tags | exploit, vulnerability, sql injection
SHA-256 | 67ee02e0b5694b14f0011efc0a8cb3134f865a21e9fd86180e92abd4be94ca7a
ha_SQWebmail_css.txt
Posted May 7, 2005
Authored by Zinho | Site hackerscenter.com

SQWebMail is vulnerable to Cross-site scripting / HTTP Response Splitting.

tags | advisory, web, xss
SHA-256 | b1598238af35468ae7390ddb40c1325dab2802e792487ba37010e46dfab6bc58
yawcssibp.txt
Posted May 7, 2005
Authored by Zinho | Site hackerscenter.com

Yet Another "Why CSS Is Bad" Paper.

tags | paper, web
SHA-256 | 0c887d986ae284f7c70a519bdfe8487982c28a01419f992b0641e7cd3f0249f4
yaggs.c
Posted May 7, 2005
Authored by ch0mik

Sniffer for "Gadu Gadu", which is a chat program in the style of MS Messenger/Yahoo Messenger, but aimed at Poland / Polish-speaking people.

tags | tool, sniffer
SHA-256 | 7c2e84981d0bb5e809d320011bedd1558b1ac36cc5630e16f804106cb6f592bd
snmppd_dos.txt
Posted May 7, 2005
Authored by Xpl017Elz | Site slava.local.nsys.by

Snmppd format string vulnerability. Snmppd (used by / with Nagios) may contain a format-string vulnerability in unsafe syslog() calls.

tags | advisory
SHA-256 | 530283249b60e4f090b7e6f5b2df86eca244287192c133b0dfe453b3eb4a9996
cirt-31-advisory.pdf
Posted May 7, 2005
Authored by CIRT.DK | Site cirt.dk

Novell Nsure Audit contains a Denial of Service vulnerability. The webadmin.exe module, which listens on TCP port 449, becomes unresponsive when a bruteforce attack is conducted against it.

tags | advisory, denial of service, tcp
SHA-256 | c90a01df5fa37c3a125d238fc52b66d73fbca467084ba0b86ad17914941ef7c7
DMA_2005-0423a_.txt
Posted May 7, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Nokia Affix Bluetooth Integer Underflow. Affix is a Bluetooth Protocol Stack for Linux that was developed by the Nokia Research Center, and implements Bluetooth protocols. This may lead to a local root compromise.

tags | advisory, local, root, protocol
systems | linux
SHA-256 | 0b3e9bf80b6a9d1c3d8e5193b6e58cdca58f84d5a3afe253d5f89b22b04f820d
7330ecart.pl
Posted May 7, 2005
Authored by Emanuele Gentili

E-Cart remote command execution exploit. Executes a reverse shell using a buggy open() call in E-Cart.

tags | exploit, remote, shell
SHA-256 | b2784c5e78f48cc00ab73c0398351c0cf34b604571531aef72a64696d3973f62
StorePortal2.63_sqlinj.txt
Posted May 7, 2005
Authored by Diabolic Crab | Site digitalparadox.org

Store Portal 2.63 is vulnerable to SQL injection. Example exploit URL included in advisory.

tags | exploit, sql injection
SHA-256 | 36069a8bc200f7e07a82f9d602315494af4563454f1a9a979135b31706910c0a
E-Cartv1.1_cmdexec.txt
Posted May 7, 2005
Authored by Nicolas Montoza | Site soulblack.com.ar

E-Cart v1.1 Remote Command Execution advisory. The file index.cgi contains a vulnerable open() call, resulting in remote command execution with the CGI privileges.

tags | advisory, remote, cgi
SHA-256 | f3cdf6d3c914451395834918e3bdedb01a7d7d66ce540c1af4f0ef8ee8dabac3
dc_BKForum_4.txt
Posted May 7, 2005
Authored by Diabolic Crab | Site digitalparadox.org

BK Forum v.4 is vulnerable to multiple SQL injection vulnerabilities. Advisory includes example exploit URL.

tags | advisory, vulnerability, sql injection
SHA-256 | 88e22bd5f279a93f88df060dd312cb550288bf0e52da84bda4720bf69379b432
javascriptFun.txt
Posted May 7, 2005
Authored by Dr_aMado

This tutorial is an overview of how javascript can be used to bypass html forms and how it can be used to override cookie/session authentication.

tags | paper, javascript
SHA-256 | f33ef88eca88474ed96f2530c0a55fe5a5ea9ba9b220adc864b72f8b931e4932
Page 1 of 1
Back1Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close